Lucene search

K
githubGitHub Advisory DatabaseGHSA-XQPP-26PP-2365
HistoryMay 24, 2022 - 7:03 p.m.

XSS vulnerability in Jenkins Markdown Formatter Plugin

2022-05-2419:03:11
CWE-79
GitHub Advisory Database
github.com
3
jenkins
markdown
formatter
plugin
xss
vulnerability

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

26.9%

Jenkins Markdown Formatter Plugin 0.1.0 and earlier uses a Markdown library to parse Markdown that does not escape crafted link target URLs.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to edit any description rendered using the configured markup formatter.

Jenkins Markdown Formatter Plugin 0.2.0 uses a different Markdown library that is not affected by this problem.

Affected configurations

Vulners
Node
io.jenkins.pluginsmarkdown-formatterRange0.1.0
VendorProductVersionCPE
io.jenkins.pluginsmarkdown-formatter*cpe:2.3:a:io.jenkins.plugins:markdown-formatter:*:*:*:*:*:*:*:*

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

26.9%

Related for GHSA-XQPP-26PP-2365